byod - cyberoam - securing you · pdf fileday [source: report by inmobi & mobext]. ......
TRANSCRIPT
White paper
www.cyberoam.com
BYOD- A blessing orcurse in disguise?
BYOD- A blessing orcurse in disguise?
www.cyberoam.com I [email protected] Elitecore Product
Something evolving! What is it?
BYOD-A brief
Well-nested, already!
An ‘Enterprise Revolution’ in Making
Security Care-takers see it Red!
Should every organisation, adapt this new hype?
A Safety Wrapper around BYOD
Why Cyberoam?
Conclusion
Contents
2
2
5
6
6
2
3
4
5
1
www.cyberoam.com I [email protected] Elitecore Product
“Of the 15 million iPads on the street,
half among them make their way to
work; indicating a (BYOD) culture, that
has already set its firm roots of
growth.”
Something evolving! What is it?
BYOD-A brief
Well-nested, already!
Talking about businesses today, things seem changed. Before our
businesses could even wake to the reality of escalated usage of mobile
phones, smartphones and tablets have come along to grab their own
share in everything we do, right from the way we communicate to the
way we work. Their portability and ease of use gives us access to any bit
of information we may need regardless of where we are.
With every feature customizable, we can organize everything – right
from our contacts, photos, videos, music, calendars, e-mail,
information and also applications, exactly the way we want it and at its
best for each one of us. And these are the very reasons why they have
so profoundly found a place in our lives, and especially at our
organisations.
BYOD (Bring Your Own Device) is a term, which represents the culture in
which the employees bring their personal computing devices like
smartphones, laptops and PDAs, to their workplaces and use it within
the corporate networks, to accomplish their corporate tasks.
For certain businesses, BYOD is an approach where an organisation
provides flexibility to its employees to use their personal devices in
corporate network, along with devices offered by the organisation. In a
BYOD culture, an employee is permitted to use his/her own personal
device to access enterprise end user computing resources like email,
intranet, business applications etc.
BYOD is no process or procedure; it is a trend which is growing rapidly.
Of the 5 billion mobile phones, users across globe possess; 1.08 billion
are smartphones . This clearly proves the extent to which smartphones
have penetrated in terms of usage. Among all the smartphone users,
89% of them use it throughout the day, indicating the influence these
smartphones have on all activities a smartphone user does in a day,
which also includes his work. With more and more people purchasing
and using these smartphones, assumptions of these phones entering
organisations can be believed. With the highest smartphone
penetration rate of 62% being in the 25-32 age group, it’s a believable
fact that smartphones make their way to work.
Talking about tablets, in terms of stats, 11% of adults already own a
tablet computer of some sort, of which 77%, use their tablets every day
[Source: Pew Research Center & The Economist Group]. Elaborating on
terms of usage, tablet owners spend an average of 90 minutes on them
per day and around 56% of tablet users say they use it several times a
day [Source: Report by InMobi & Mobext]. User friendliness and its
attribute of being mobile, makes it a must have device for some. The
penetration level of tablets ensures their presence in organisations.
This sudden smart-phones and tablet popularity has taken many
enterprises by surprise. The effects of increased usage of tablets and
smart phones can be clearly seen on organizations and the way they are
functioning today. Of the 15 million iPads on the street, Forrester
Research figures say that half among them make their way to work;
indicating a culture, that has already set its firm roots of growth. 2
An ‘Enterprise Revolution’ in MakingWith the increasing sales of these devices, BYOD is now more than what it
was actually perceived. It has a more positive and acceptable reputation in
enterprises today, as enterprises are constantly expanding and the roles of
employees are ever evolving. Teams now include people that may be
around the road virtually or at their desks. People come from all around the
world, doing various tasks and hence the nature of their jobs involves a
range of devices, to address consumers.
Hence employees today have attached their personal devices to their work
flows. Whether somebody chooses an Apple or an Android or a Blackberry
or a Windows device, it is now about including these devices to a network.
CIO, CTO and IT heads are now looking for a highly collaborative workspace
or rather are expecting a work culture in which anyone can join in from
anywhere using anything. The idea of people being hooked to their desks is
no longer acceptable as mobile experience has indeed transformed the
way organisations do their business today. Hence more and more
enterprises and businesses are embracing the BYOD culture rapidly.
Teams today use their personal devices when they need to connect with
clients, or they need to connect internally. And with BYOD culture they can
do this quickly, efficiently and in a much more productive manner. IT teams
today aim to build an ecosystem around unified communications, as BYOD
demands for one.
Keeping in mind these statistics and trends; predictions of more enterprise
embracing BYOD seem more real. Apart from these, enterprises also have
convincing reasons to allow employees to use personal devices for work
–including Productivity enablement, Business IT capital cost savings, Social
collaboration enablement, workplace trends elsewhere and ‘because the
employees want it’ phenomena.
Despite the potential security risks and concerns, permissions to use these
devices are growing tremendously among several enterprises. IT
administrators have started designing new policies that support usage of
these devices to access network resources, in an attempt to balance
security and productivity together, using BYOD.
www.cyberoam.com I [email protected] Elitecore Product
“Employees today have attached their
personal devices to their work flows.
Whether somebody chooses an Apple
or an Android or a Blackberry or a
Windows device, it is now about
including these devices to a network.”
3
www.cyberoam.com I [email protected] Elitecore Product
Security Care-takers see it Red!BYOD has already arrived, well before we thought it would and as it comes
it brings a whole new set of concerns for IT administrators. Organizations
are now worried about securely introducing these devices into the
enterprise networks. The main question is, ‘Can these devices be
controlled using the same security policies, like company-issued devices?’
Well, answer to this is both a Yes and a No.
Talking about security solutions, organizations should opt for a solution
that offers both, threat prevention and data protection. There are
numerous security providers for dynamic and mobile scenarios, but only a
right and apt solution will work. The right solution should offer the ability
to minimize incidents of data loss or leakage, collectively.
At every organisation, in order to ensure security, productivity and
connectivity, IT department needs to know who is on the network, where
the user is, what type of device the user is using and what the status of the
device is. Visibility to granular levels can ensure smooth functioning
among teams of an organisation. Under the BYOD scenario, it becomes
very difficult to monitor all these various devices that keep coming in and
leaving the network anytime.
Under a BYOD culture, unlisted personal devices owned by varied people,
joining in to the company network, increase the chances of infected
devices transmitting viruses to the network, thereby also infecting the
other devices connected to the network.
With the arrival of new devices to network, ensuring network security
becomes a top priority. With 63% users sharing their tablet with 2 or more
people [Source: UM Research], securing data on such devices is a
challenge. This becomes a major concern for organizations that deal with
confidential data, as users may use their personal device to
download/access organisational data and once out of the network may
hand over the device to someone who is not so loyal to that data. Talking
about data leakages, there exist 2 scenarios that can lead to data leakage in
a BYOD scenario and they are Unsecure Network Access and Device Loss or
Theft.
With the BYOD scenario making Internet use convenient, owner of these
devices may access unsecure sites or make use of random unauthorised
apps that are not properly configured for security, opening the doors for
sensitive corporate information stored on that device to go out.
Too many devices accessing the corporate network increase the threat of
data loss through device theft or device lost. Device theft comes with the
anticipation that malicious users can access sensitive information stored in
it. The danger grows severe when the data accessed, using the lost device,
was sensitive information.
Unsecure Network Access
Device theft
Visibility
Network Security
Data Leakage
“(BYOD) brings a whole new set of
concerns for IT administrators...
Organizations are now worried about
securely introducing these devices
into the enterprise networks.”
4
www.cyberoam.com I [email protected] Elitecore Product
Bandwidth crunchApart from security, the strain personal devices, viz. iPads will put on
wireless networks, has everyone concerned. The network administrators
are already crying out loud about their concerns on network security and
the alarming network usage that are becoming a reality with the new BYOD
culture. Keeping the iPad protected and updated with new functionalities is
a continuous job, and also a huge drain on an organization’s network
resources as updates and upgrades can be several GBs in size. With multiple
iPad users in an organization, impact of this on the network is tremendous.
Reducing the effect of such bandwidth crunch on business networks has
become crucial and urgent.
Having said that the prime question to be asked is, ‘Does your organisation
need to adapt BYOD?’ While considering the decision to adapt BYOD,
organisations should start with evaluating the consequences, if their
employees were to use personally owned devices, for organisational work.
Quantum of benefits and risks should be estimated, accordingly, before
venturing into this new dynamic culture of BYOD. For organisations like the
ones offering defence services or those dealing with highly sensitive data,
BYOD may not be the right choice, especially considering the consequences
on data leakage. Whereas, for SMEs with cost cutting on their main agenda,
BYOD may be a blessing, with reduced costs on inventories, as devices used
in BYOD culture, are owned and maintained by employees at their own
expense.
Like every other innovative culture, BYOD for sure, comes along with
numerous productivity and connectivity benefits, but security still remains a
concern. Before deciding on imbibing BYOD at your organisation, it’s good to
evaluate what are your priority essentials. It is good to know, whether your
requirement is productivity or security.
Just for a matter of understanding, let’s take the example of air travel. Air
travel was considered as the riskiest mode of travel, as most air accidents did
not leave any survivors. But the point to be noticed is, whether these facts
and risks, anyway hinder in air travel being used as a mode of travel. The
answer is no. As we all know, avoiding air travels was never a feasible idea;
hence considering its high utility and necessity, steps to ensure security
were taken. Today, air travel is the safest mode of travel in the world, and the
air travel industry has achieved this, by understanding the risks and
implementing measures to ensure security.
Talking about control, IT departments have little or limited control, over
unlisted personal employee devices. Hence the best policy for security is to
have visibility and control over what devices are getting connected to the
network and by which user, along with having the flexibility of extending the
security and network access policies that exist for a user, to all the new
devices the user brings into the network. In a BYOD scenario, administrator
should have the right to dictate, which user can access network resources,
what amount of network resources can the user access based on
parameters like time for access, bandwidth availability, applications used,
websites accessed, and more, along with the visibility of, which user or user
device used what network resources.
Should every organisation, adapt this new
hype?
A Safety Wrapper around BYOD
“In a BYOD scenario, administrator
should have the right to dictate, which
user or user device can access network
resources, what amount of network
resources can the user access based on
parameters like time for access,
bandwidth availability, applications
used, websites accessed, and more,
along with the visibility of, which user
or user device used what network
resources.”
5
www.cyberoam.com I [email protected] Elitecore Product
Toll Free Numbers
USA : | India :
APAC/MEA : | Europe :
+1-877-777-0368 1-800-301-00013
+1-877-777-0368 +44-808-120-3958
C o p y r i g h t © 1999-2012 E l i t e c o r e Te c h n o l o g i e s Pvt. L t d. A l l R i g h t s R e s e r v e d . Cyberoam & Cyberoam logo are
registered trademarks of Elitecore Technologies Pvt. Ltd. ®/TM: Registered trade marks of Elitecore Technologies or of the
owners of the Respective Products/Technologies.
Although Elitecore attempted to provide accurate information, Elitecore assumes no responsibility for accuracy or completeness
of information neither is this a legally binding representation. Elitecore has the right to change, modify, transfer or otherwise
revise the publication without notice.
Cyberoam Awards & Certifications:-
Unified Threat Management
(UTM)Cyberoam Central Console(CCC)
Cyberoam iViewIntelligent Logging & Reporting
Cyberoam - Endpoint Data Protection
Data Protection
& Encryption
Device
Management
Application
Control
Asset
Management
Cyberoam’s entire Security Portfolio
Why Cyberoam?Cyberoam UTM’s unique Layer 8 Technology allows network administrators to design identity-based policies, which
extends throughout the network, irrespective of the device used by the employee to connect to the network. Cyberoam
UTM offers secure identity-based AAA (Authentication, Authorization, Audit) over a single device, allowing control and
knowledge of who is connected to your network, using what device and what they are accessing. You can design security
policies that allow you to decide, what each user/user group can access in terms of websites/applications over Internet
and for how long, the amount of data transferred and bandwidth they can consume.
Cyberoam
Authenticates
User Login
Cyberoam
Authorizes
Cyberoam
Audits
• User Name
• IP Address
• MAC Id
• Session Id
• Internet surfing quota
• Schedule control
• Security Policies
• Web Filtering
• Application Visibility & Control
• QoS / Bandwidth Management
• IM Controls
• Identity - based Logs + Reports
• Compliance Reports
Cyberoam’s Identity based AAA on a single appliance
ConclusionWith increasing numbers of smartphone and tablet sales, these devices will no doubt become more prevalent in the
business world. Both employers and employees are voicing their views about the gadgets they want to use for work, and IT
is confronted with issues to identify BYOD strategies, in order to fulfil the requirements of these gadgets.
BYOD no doubt is very flexible and highly useful, but it presents some grave challenges to organizations like, ensuring that
unauthorized devices are prohibited from using organizational infrastructure, to assure network security and rightful
usage of network bandwidth.
6